1 / 24

Telco & Mobile Security Strategies

Telco & Mobile Security Strategies. Mobile Device Security - State-of-Play. Android. Permissions Limited access to approved data/systems Access Control Password & Idle screen locking Isolation Limits an apps ability to access data or other system resources Encryption

oakes
Télécharger la présentation

Telco & Mobile Security Strategies

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Telco & Mobile SecurityStrategies

  2. Mobile Device Security - State-of-Play Android • Permissions • Limited access to approved data/systems • Access Control • Password & Idle screen locking • Isolation • Limits an apps ability to accessdata or other system resources • Encryption • Conceal data at rest on the device • Provenance • Apps are stamped to identity theauthor for tamper resistance Apple iOS Symantec - A Window Into Mobile Device Security (11.Jun)

  3. Mobile – Current & Future Threats • Mobile devices hold a richset of personal information: • Location details • browsing & call history • contact lists & phone #’s • SMS, email & Facebook • Calendar details • Passwords in clear text • Premium-rate calling • Internet Access remainsa large vulnerability hole • Up-In-Coming Threats • Micro-payment vulnerabilities • Access to corporate server • “LikeJacking” McAfee - Mobility and Security Dazzling Opportunities, Profound Challenges (11.May) LookOut - Mobile Threat Report (11.Aug)

  4. Mobile Security – Market Challenges • Recent Issues… • iPhone “Root-kitting” • Bypassing device security • Theft of smartphones, & tablets • sensitive records compromised • Spoofed ActiveSync policy apps • Reporting higher security than what is actually available • “Co-mingling” • Mixing private & corporate data • Malware • Stealing data & bandwidth • Uncertified apps with malware • Capturing info & forwarding • Device Management Checklist J. Gold - A Heuristic Approach to Mobile Security, ‘11

  5. Malware Threat Example - Repackaging LookOut - Mobile Threat Report (11.Aug)

  6. Mobile Security – Lacking Awareness • Awareness of Company Security and Data Protection Policies for Mobile Devices: • Greatest Security Concerns forMobile Devices McAfee - Mobility and Security Dazzling Opportunities, Profound Challenges (11.May)

  7. Telco Security – Market Drivers • Subscribers • Mobile users are in early stages of facing significant mobile threats. • Handsets hold sensitive data • Access to sensitive data (online banking, micro payments) • Subscriber are unaware of mobile security threats and mitigation is largely ignored. • Operators • Lacking visibility to subscriber network activity & threats • mobile, land-line, & internet • protection for subscribers • Providing additional service value • Preparing for future mobile threats

  8. Malware Mitigation – Hidden Costs • Maintenance and Repair • Managing signature updates • Cost of paying to fix systems infected by malware • Hardware Overhead • Most anti-malware consume large amounts processing power, memory and storage space. • Lost Productivity • Lost Productivity per employee • Differing mobile Operating Systems to manage infections • Company Costs • Due to stolen Mbytes of bandwidth from Malware LookOut - Mobile Threat Report (11.Aug) http://www.networksecurityjournal.com/features/malware-burden-012208/

  9. Mobile Data - Smartphone Trends • Subscribers used 79 MB per month in ‘10,  125% from ‘09 • Expect a 16-fold increase (1.3 GB per month) by ‘15 • Average mobile speed in ‘10 was 215 kbps, 2.2Mbps by ‘15. Cisco - Visual Networking Index Global Mobile Data '11

  10. Mobile Data – Increasing Costs & Usage • Evolving Usage by App – (Allot) • Monthly Data Usage – (Nielson) Allot – Mobile Trends, Global Mobile Broadband Traffic Report 11.H1 Average U.S. Smartphone Data Usage Up 89% as Cost per MB Goes Down 46% http://blog.nielsen.com/nielsenwire/online_mobile/ http://www.wired.com/wiredscience/2011/06/how-much-does-your-data-cost/

  11. Malware is Stealing Bandwidth 39%VideoStreaming 12% WebBrowsing 3% VoIP& IM 2% Malware& Other 44% FileSharing GPRSUMTS Internet TCP/IP 16.8%Viruses 7.8%Worms 2.3%Adware 70%Trojans 1.9%Backdoor SwitchingNetwork 0.1%Spyware Panda Security - Malware Statics, 11.Mar.16Allot – Mobile Trends, Global Mobile Broadband Traffic Report 11.H1

  12. Mobile Malware Usage - Vampire Data • Malware bandwidth stolen • From €15 to€60 per year0 • Accelerators • Roaming will accelerate malware cost by over 30x1 • Multiple Malware instances  • Power Users are 25x more exposed to malware costs2 • A Provider with 1m subscribers - Vampire Costs would exceed €30m per year3 • Smartphones Data Cost • 0 Based on 500 bytes/min typical = 21.6 MB per month @ €0.06 per MB, & up to 4 Malware per handset • 1Based on Roaming costs in Europe between € 1.2 and € 12 Euros per MB, 2Based on 2GB monthly usage • 3Average two malware instances across the subscriber base • - http://ec.europa.eu/information_society/activities/roaming/data/index_en.htm • - Average U.S. Smartphone Data Usage Up 89% as Cost per MB Goes Down 46% • http://blog.nielsen.com/nielsenwire/online_mobile/

  13. Mobile Security – Emerging Patterns • Malware acting as a botnet will exploit many vulnerabilities • Abuse of premium-rate text messages • Attacks gather sensitive data for commercial or political purposes • Financial fraud as more mobile finance and payment apps emerge LookOut - Mobile Threat Report (11.Aug) Cisco - Visual Networking Index Global Mobile Data '11

  14. Telco Security - Objectives • End-point protection achieved by app suites • Firewalls & VPN • Disk Encryption • Remote wiping • Location-based services • Anti-Malware • Infrastructure Security utilizes • Managed Security • Flow statistics • Policy compliance • Intrusion detection • Network Behavior Analysis • Separating normal behavior from anomalous behavior • End-Point Protection Infrastructure Security • Subscriber Security Strategy

  15. MobileNetwork Mobile & ISP Infrastructure Security Subscribers GPRSUMTS Internet TCP/IP Gbps NetFlow Infrastructure Security Monitoring, NetworkBehavior, ForensicsPolicy Compliance Carrier Security Services Endpoint Security Firewall, VPN, Disk Encryption,Anti-Malware, etc. IntelligentAnalytics &Reporting ActionableMitigation ThreatNotifications CognitiveAnalyst SwitchingNetwork

  16. Mobile Security - Approach

  17. Telco Security – Strategic Direction • Endpoint Security via security suites for mobile handsets • Via periodic signature updates sent to the handset • But Endpoint Security is reliant on subscribers to install SW • Infrastructure Security is necessary to protect mobile subscribers • Via Network Behavior Analysis, core traffic patterns are analyzed and normal behavior is separated from abnormal behavior to detect malware • “For €2 per month we will protect you against malware-stealing-bandwidth & lost productivity” ! Fraud Security Attack Phishing Malware Spyware ! Hacking Virus

  18. Mobile Security – Business Case • Increased Revenue -  ARPU • Value-added security services • Core Infrastructure Cost Saving • Reduce “stolen” BW by malware • Increased security & network visibility - leads to efficient infrastructure spending • Increased Client Satisfaction • Client trust in mobile carrier through safer mobile surfing • Protect transactions for online banking, & confidentiality • Competitive Differentiation • Through enhanced security services for corporate clients • Legal Conformity • Protection of minors, dangerous, & illegal content • Increased Network Reliability • From reduced malware instability • Data traffic prediction becomes more precise, through modeling of legitimate applications ARPU – Average Revenue Per User BW - Bandwidth

  19. Cognitive Security - What We Offer • Security Innovation • Delivering Next Generations Security Solutions • Research & Development Expertise • Continual & Rapid development • Quick development turn-around • Cost Effective R&D Resources • Integration with OEMs, MSSPs, & Device manufacturers • Addressing Privacy Concerns • Data anonymity is maintained • Product Stability • 5th Generation Network Behavior Analysis platform • Intuitive Management Interface • Easy-to-Use Dashboard • Granular attack detection analysis

  20. Telco Security – Final Thoughts • “The number of times an uninteresting thing happensis an interesting thing.” • Marcus Ranum“laws of intrusion detection.” • “Cybercriminals are investing more toward ‘R&D’ to find ways to use mobile devices and penetrate the cloud to seize the data they need to make a profit or undermine a company’s success.” • “… mobile operators will try to prevent threats at the network level… ‘If the mobile operators pushed out antivirus to their customers’ devices, it would scare users … So operators are keen to solve security issues themselves at the network level.” • Gareth MachlachlanChief Operating Officer Cisco - Annual Security Report '11 TechTarget - Security Tech Guide Mobile '11, “Mobile Phone Security Threats, Blended Attacks Increasing”

  21. Download the Original Presentation Here: • http://gdusil.wordpress.com/2013/03/08/telco-and-mobile-security-12/

  22. Synopsis - Telco & Mobile Security ('12) • As mobile data is expected to grow 16 fold over the next four years*, mobile providers are facing new challenges in balancing subscriber ease-of-use, with cyber-security protection.  This explosion in cellular usage and mobile commerce will require advanced levels of protection for mobile users, as hackers continue to find vulnerabilities to exploit. A dual strategy which includes end-point and infrastructure security will provide robust and cost effective levels of protection, which will also expand provider revenue streams to enhanced services, and increase ARPU through value added security solutions.  Network Behavior Analysis is a viable building block to infrastructure security, and helps to protects a collective subscriber base against sophisticated mobile cyber-attacks. • *Cisco - Visual Networking Index Global Mobile Data '11ARPU – Average Revenue Per User

  23. Tags • Network Behavior Analysis, NBA, Cyber Attacks, Forensics Analysis, Normal vs. Abnormal Behavior, Anomaly Detection, NetFlow, Incident Response, Security as a Service, SaaS, Managed Security Services, MSS, Monitoring & Management, Advanced Persistent Threats, APT, Zero-Day attacks, Zero Day attacks, polymorphic malware, Modern Sophisticated Attacks, MSA, Non-Signature Detection, Artificial Intelligence, A.I., AI, Security Innovation, Mobile security, Cognitive Security, Cognitive Analyst, Forensics analysis, Gabriel Dusil

More Related